Latest Social Media News
112.8K views | +0 today
Latest Social Media News
Latest Social Media News
Curated by Gerrit Bes
Your new post is loading...
Your new post is loading...
Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

The Executive's Guide to BYOD and the Consumerization of IT (free ebook)

The Executive's Guide to BYOD and the Consumerization of IT (free ebook) | Latest Social Media News | Scoop.it
The 'bring your own device' phenomenon is reshaping the way IT is purchased, managed, delivered, and secured. This ebook rounds up our best BYOD content and puts it all into a convenient PDF.

Via Gust MEES
Rescooped by Gerrit Bes from ICT Security Tools
Scoop.it!

Mobile Device Management, Mobile Application Management and Mobile Content Management Solutions for the Enterprise | AirWatch

Mobile Device Management, Mobile Application Management and Mobile Content Management Solutions for the Enterprise | AirWatch | Latest Social Media News | Scoop.it
AirWatch is the leader in enterprise-grade mobile device management, mobile application management and mobile content management solutions, designed to simplify mobility.

 

Read more:

http://www.air-watch.com/

 


Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

CoSN examines BYOD safety and security

CoSN examines BYOD safety and security | Latest Social Media News | Scoop.it
A new report from the Consortium for School Networking (CoSN), titled “Safe & Secure?

 

“Apps and mobile devices are being utilized more and more in education, forcing schools to reexamine their mobile device policies,” said CoSN CEO Keith Krueger. “These continuous advancements are creating an unprecedented set of safety and security challenges for school leaders, so it’s imperative that leaders are prepared and have at their fingertips a set of technical solutions to prevent data breaches and protect personal devices.”

 

Gust MEES: read also my FREE courses here

 

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

 

Read more:

http://www.eschoolnews.com/2012/09/10/cosn-examines-byod-safety-and-security/

 


Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

View from the IT desk: Securing social networking in the workplace

View from the IT desk: Securing social networking in the workplace | Latest Social Media News | Scoop.it
In this age of "instant information" is it shortsighted to block social networking sites within an organisation purely because of stories in the press relating to scams, misuse and threats?

 

Is it time for a re-think?

With the increase in the number of organisations embracing Bring Your Own Device (BYOD) this trend is only going to grow.

So perhaps now is the time to look at educating users about the issues, and empowering them to use these tools responsibly, rather than trying to block access; after all, this may turn into a battle you can’t win.

 

So, how do you educate users about social networking sites and the issues around them?

 

- Passwords


Teach users about good password management including password strength (difficult to guess but easy to remember), password security (keep it to yourself) and using different passwords for different sites (a password is only as strong as the weakest system you use it on).


- Scams, clickjacking and fake apps


Teach users how to spot something that is attempting to drive traffic, harvest data or steal identities. If people are aware of what can happen they may be less inclined to click anything-and-everything in the hope of a free gift.

 

- Sensible sharing


Social networking sites can be restricted to allow only a limited number of people to access data and information. If you have a target audience, do you need to tell ‘everyone’ or only those you wish to educate? Teaching people how to amend these settings to protect themselves will help you protect any corporate data you wish to place on there.

 

- Monitoring (for employees)


Social networks send emails relating to access, posts and mentions. Monitoring these will highlight any potential misuse which can be stopped before it gets too severe.

 

- Monitoring (for employers)


Regular checks of internet usage will show any misuse of social networking sites. All employees should be aware you are monitoring internet access and that misuse will be investigated. This should act as a deterrent for anyone who wishes to misuse the privilege and use corporate resources to "check their CityVille..." or "click that link for a free iPad..."

 

Read more:

http://nakedsecurity.sophos.com/2012/08/20/securing-social-networking/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+nakedsecurity+%28Naked+Security+-+Sophos%29

 


Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

10 BYOT / BYOD Back to School Basics

10 BYOT / BYOD Back to School Basics | Latest Social Media News | Scoop.it

Gone are the days where students sit neatly in rows all prepared with the same back to school supplies ready to consume instruction. As the 2012/13 school year approaches, one thing is clear. One-size-fits-all is out and personalization is in. This doesn’t only apply to the classroom instruction, it also applies to the mobile devices your students choose to use for learning.

 

===> Today student choice = personalization. The teacher sets the learning goals, but students choose their own tools or learning. <===

 

Gust MEES: Don't forget about IT-Security and be aware of the malware! "Nobody is Perfect!", so ALL "OS" are vulnerable and especially smartphones and any other device connecting to Internet also! And there are also a lot of Apps around who are malicious...

 

===> Take care and as teacher and educator take your ===> responsibilities <=== to educate your learners of the dangers of Internet and How-To protect best! <===

 

In 21st Century while using "Bring Your Own Device" (Hashtag for Twitter = #BYOD) there is a MUST to know about basic IT-Security knowledge! The teachers role is NOT anymore to be the MOST important person, but the LEARNER!

 

So the teacher needs to have that basic knowledge to share it with its learners and to try to keep a safe Learning Workspace... Online and Offline, in the "internal learning network" and also in the "external learning network"!

 

As Teachers, Educators and Instructors we have to deal with Apps, OpenSource software, Freeware, different OS devices, so we need to know about the risks and dangers! We need to know how to get protected these devices also!

 

It's not ONLY the IT-Admin's responsibility, IT-Security is the responsibility of ALL of us!!!

 

Check also:

 

- http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

  

- http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

  

- http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

  

- http://www.scoop.it/t/ict-security-tools

  

- http://www.scoop.it/t/securite-pc-et-internet

 

 

                         ===> Be aware of the malware! <===

 


Via Gust MEES
EdTechSandyK's comment, August 3, 2012 12:13 PM
When I rescooped your post, I did not realize I was erasing someone else's comments. I thought I was just cleaning up extra-text that had been auto-inserted at some point. I was also concerned that there was a malware warning included in what I thought was auto-generated text; I did not want to keep links with the post that might spread malware.

I am still learning about the ins and outs of ScoopIt; it is unfortunate that you jumped immediately to the conclusion that I was censoring you because that was not my intention. Per your request, I will remove the re-scoop post my topic, since I now understand the comments were inserted by a user but do not want to share links that might include malware. Thank you for contacting me. I apologize for my unintended offense.
Gust MEES's comment, August 3, 2012 12:18 PM
Hi Sandy,

OK, everything alright now. My apologies for having reacted also that way, but when it is about Censorship of my own text...

Concerning "malware", You don't have to fear about my links, just have a look at my profile on the bottom of my free IT-Security courses (links above in the text) and You will understand that they are secure ;)

Have a great day,
Gust
Gust MEES's comment, August 3, 2012 12:25 PM
Hi Sandy,

It is important that learners get told how to protect their BYOD-Devices and to know also about the dangers with it. So that's why I included thta special text with links. When now someone makes a rescoop of your "rescooped" censored #scoopit then it would:

1.) Not include my original text with advice and links
2.) Other people who will "rescoop" from your #scoopit will also not get that important knoledge

Have a great day,
Gust

Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

veracode-mobile-security-ebook.pdf

VERACODE: Mobile Security for the Rest of Us!
Get Our Fun New E-book

Join Joe IT and his blissfully unaware mobile device user Joe Worker as they navigate together the perils of BYOD. It’s a whimsical look at a serious subject and readers walk away with Ten Tips to secure their device.

 

Gust MEES: A MUST READ!       

 

Read more about VERACODE here:

http://www.veracode.com/

 


Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

Why You Should Care About Mobile Security [INFOGRAPHIC]

Why You Should Care About Mobile Security [INFOGRAPHIC] | Latest Social Media News | Scoop.it
An infographic from security-testing company Veracode explores the rise of data breaches and what it could mean for businesses and consumers.

Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

BYOD: Mobile security stats

BYOD: Mobile security stats | Latest Social Media News | Scoop.it
OpenDNS and the Ponemon Institute teamed up to create a unique infographic that provides statistics on one of the most concerning topics in the industry.

 

Gust MEES

 

Please check my FREE courses and curations here to get smart and don't forget "Forewarned is Forearmed"!

 

- http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 

- http://gustmees.wordpress.com/category/get-smart-with-5-minutes-tutorials/

 

- http://gustmeesen.wordpress.com/2012/03/16/beginners-it-security-guide/

 

- http://www.scoop.it/t/ict-security-tools

 

- http://www.scoop.it/t/securite-pc-et-internet

 

- http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

           ===> Be aware of the malware!!! <===

 

Read more:

http://www.scmagazine.com/mobile-security-stats/slideshow/805/#0

 


Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from Apple, Mac, MacOS, iOS4, iPad, iPhone and (in)security...
Scoop.it!

Toronto study shows mobile spyware's long shadow

Toronto study shows mobile spyware's long shadow | Latest Social Media News | Scoop.it
(Phys.org)—Spyware sold legally can infect BlackBerrys, iPhones, and other mobile devices, according to a study from two security researchers at the University of Toronto Munk School of Global Affairs' Citizen Lab.

 

Gust MEES: NOBODY IS PERFECT!

 

Read more:

http://phys.org/news/2012-09-toronto-mobile-spyware-shadow.html

 


Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from ICT Security Tools
Scoop.it!

Sophos helps businesses embrace BYOD

Sophos helps businesses embrace BYOD | Latest Social Media News | Scoop.it

“BYOD is top of mind for myriad organisations; however, it’s causing some concern among IT. The increase in personal devices accessing the network may complicate the process of ensuring devices are secure and compliant with company policies, making it difficult for IT to justify broad BYOD acceptance,” said Stacy K. Crook, senior analyst, Mobile Enterprise Research, IDC. “Solutions with features like those found in the latest version of Sophos Mobile Control allow organisations to develop BYOD strategies without compromising on security, or complicating the overall management of the network.”

 

In addition, if it a mobile device becomes non-compliant, the new release will alert IT, so the administrator can send messages to the user for minor violations. For more serious incidents, the administrator can configure a set of tasks, which will be applied automatically. Examples include corporate or full wipes as well as policy changes to avert any risk for corporate data.

 

Gust MEES: a MUST read for anyone who uses "Bring Your Own Device" (Hashtag for Twitter =#BYOD):

http://www.net-security.org/secworld.php?id=13423

 


Via Gust MEES
No comment yet.
Rescooped by Gerrit Bes from 21st Century Learning and Teaching
Scoop.it!

Bring Your Own Device: Advantages, Dangers, Risks and best Policy to stay secure

Bring Your Own Device: Advantages, Dangers, Risks and best Policy to stay secure | Latest Social Media News | Scoop.it

Bring Your Own Device (BYOD) is more complex than most people know, read further to learn… . .

 

Keywords for this free course: . motivation, engagement, heroes, Security-Scouts, critical thinking, stay out of the box, adapt to new technologies, be aware of the malware, nobody is perfect, knowing the dangers and risks, responsibility, responsibility of School, responsibility of IT-Admin, responsibilities of BYOD users, Apple insecurity, Insecurity of Apps, Principals responsibilities, Mobile Device Management, risks of BYOD, BYOD-Policy, IT-Security Infrastructure, Teacher-Parents Meeting, Cyberwar, Cyberwarfare, Government, Internet-Safety, IT-Security knowledge basics...

 

The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!


===> NOBODY is perfect! A security by 100% doesn’t exist! <===

 

Read more:

http://gustmees.wordpress.com/2012/07/07/bring-your-own-device-advantages-dangers-and-risks/

 


Via Gust MEES
kallen214's comment, February 6, 2013 1:18 PM
Thank you for the information.
Gary Harwell's curator insight, April 3, 2013 12:47 AM

Is ti possible that we have a special room for this?

Linda Allen's curator insight, April 5, 2013 1:08 PM

More information on BYOD